mslp - Mesh-enhanced Service Location Protocol Λ
|
|
- Arleen Fox
- 6 years ago
- Views:
Transcription
1 mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao and Henning Schulzrinne Department of Computer Science Columbia University, New York, NY fzwb, hgsg@cs.columbia.edu Abstract The Service Location Protocol (SLP) is a proposed standard from IETF. It provides a flexible and scalable service discovery framework in IP network, and it can work with or without a directory service. This paper presents mslp - Mesh-enhanced Service Location Protocol. mslp proposes to use a fully meshed peering Directory Agent () architecture. Peer s exchange service registration information, and keep the same consistent data for the shared scopes. mslp provides a reliable directory service for an SLP system. It also greatly simplifies SLP service registration leading to a thin-client Service Agent () implementation. mslp is backward compatible with SLPv2, and incremental deployment is supported. Keywords: Service Discovery, Service Location Protocol, User Agent, Service Agent, Directory Agent, Fully Meshed Peer Relationship, Reliability, Scalability 1 Introduction As computing continues to move towards a network-centric model, there is an increasing need to find and make use of the available services, devices, and applications in a variety of networking environments in order to properly complete specified tasks. For example, the mobile technology provides much convenience for a traveling user, it relies upon the support from automated service discovery. As a result, several service discovery protocols are emerging from network computing field to address this issue. The Service Location Protocol (SLP) [4] from IETF is designed to perform service discovery in IP network. Jini [7] from Sun Microsystems is tailored specifically to Java platform. The Universal Plug and Play (UPnP) [9] from Microsoft proposes to use SSDP (Simple Service Discovery Protocol) [2] for service discovery, and it addresses the issue of automatic configuration such as the assignment of IP addresses and DNS names. The Salutation Consortium [8] has announced an open architecture for service discovery. The Bluetooth SIG [5] presents its own SDP (Service Λ Supported by RPA MarketNet project. 1 Discovery Protocol) optimized for the highly dynamic nature of wireless communication using radio link. The Infrared Data Association (Ir) [6] also offers its unique service discovery protocol. Although different service discovery protocols have different features, they use two basic models. In the directorycentric model, there is a centralized directory service which maintains dynamic information about available network services, devices and applications. Each device, service and application must discover this directory service first in order to register with it or use it to look up the information about other devices, services and applications. In the peer-to-peer model, no centralized directory service is needed. Devices, services and applications negotiate oneon-one with each other, announcing their presence, advertising their own capabilities, and finding devices, services or applications that meet their needs. This model fits perfectly in an ad hoc peer-to-peer networking environment. Jini adopts the directory-centric model with a lookup service while Ir uses the peer-to-peer model. SLP and UPnP support both models. No matter what model is used, the underlying principles for service discovery are same. First, an entity (device, service or application) needs to announce its presence to others. This can be done by registering with a directory service, by regularly advertising through a special channel or address, or by listening to a special channel or address and issuing a reply when there is a request. Second, the service discovery is performed by looking up a directory service, by sending a discovery request to a special channel or address, or by listening to a special channel or address for others announcements. Most service discovery protocols utilize multicast (or broadcast) which is needed at least in the initial discovery stage such as discovering a lookup service. In some cases, information is needed if none of above mechanisms exists. Among the current available service discovery protocols, SLP is a proposed standard from IETF. It has received wide industry support. For example, Sun Microsystems has built SLP into its Solaris 2.8 operating system; Novell supports SLP in its NetWare product. SLP can work with or without a directory service. The directory service is introduced for performance and scalability considerations, and it is provided by Directory Agents (s). However, SLP does not
2 define how s should coordinate with each other when multiple s exist. This paper presents mslp - Mesh-enhanced Service Location Protocol, which enhances SLP with an interaction scheme for s. It proposes that if s are needed in an SLP system, a fully meshed peering architecture should be used, i.e., more than one should be present for each scope, and they should maintain a fully meshed peer relationship. Peer s exchange service registration information, and keep the same consistent data for the shared scopes. mslp provides a reliable directory service for an SLP system. It also greatly simplifies SLP service registration leading to a thin-client Service Agent () implementation. Thus, the scalability of an SLP system can also be enhanced. Moreover, mslp is entirely backward compatible with the SLP specification defined in RFC 2608, and incremental deployment is supported. The rest of this paper is organized as follows: first, we provide some background information about SLP in Section 2, then we describe the design of mslp in Section 3, covering design considerations, peer relationship management and message forwarding control. We show an mslp system example in Section 4, and discuss the implementation in Section 5. We list related work in Section 6, and conclude in Section 7. 2 SLP Overview Defined in Request for Comments (RFC) 2608, SLP provides a flexible and scalable framework for service discovery in IP network. Using SLP, a networked service (device, or application) can easily find all available service types, the locations (URLs) where a specific service is provided, and service descriptions. To understand how SLP works, we first review several important concepts SLP used to describe and manage networked services. Service Location Service locations in SLP are given by URLs, which can be any URL conforming to URI standard [1] such as or can be of the service: scheme defined in [3] such as service:lpr://mandolin.cs.columbia.edu. Service Type Each service in SLP has a service type. For example, the service type of is http (web service); the service type of service:lpr://mandolin.cs.columbia.edu is service:lpr (printing service). All services in SLP are categorized by their service types. Service Description Besides service location and service type, each service in SLP has many other properties which can be described by a set of attribute/value pairs. These properties include service capability and configuration parameters. For example, we may specify resolution = 1200 dpi for a printer service. Application SrvTypeRqst/SrvRqst/AttrRqst SrvTypeRply/SrvRply/AttrRply SrvTypeRqst/SrvRqst/AttrRqst SrvReg/SrvDeReg SrvTypeRply/SrvRply/AttrRply SrvAck Figure 1: SLP System Architecture Service Service Scope Each service in SLP has one or more service scopes which specify its service range. The service scope is a logical concept in SLP used to arrange services into groups. A scope could indicate a geographic location (such as London ), a administrative group (such as Law School ), or other category (such as Emergency ). Service scope provides further scalability for SLP in large systems. Service Lifetime Each service registration has a validity period given by its service lifetime (such as 12 hours). A registration needs to be refreshed before its lifetime has expired, otherwise the registration will be removed from the directory service. There are three different entities in an SLP system: User Agents (s), Service Agents (s), and Directory Agents (s). Figure 1 illustrates their relationship. User Agents (s) A initiates service discovery on behalf of one or more applications. It sends queries to all s via multicast or to a via unicast if there is such supporting the query scope. A uses three different types of SLP messages to discover the desired services. First, it issues a service type request (SrvTypeRqst) message to get a list of all available service types in a service type reply (SrvTypeRply) message. Second, it issues an attribute request (AttrRqst) message to get a list of all attributes for a given service type in an attribute reply (AttrRply) message. Third, it issues a service request (SrvRqst) message with an attribute predicate specifying the characteristics of the desired service to get a list of URLs giving the locations of matched services in a service reply (SrvRply) message. Starting from the desired service type, and a set of attributes describing the service, SLP resolves the service addresses (URLs) for the user. Service Agents (s) An works on behalf of one or more services. It responds directly to queries. If s exist, it registers the services with s using service registration (SrvReg) messages. SLP supports incremental service registration in which an can 2
3 Multicast SrvRqst (1) / Unicast Advert (2) / Multicast Advert Unicast SrvRqst Unicast SrvReg Unicast SrvAck Unicast SrvAck Unicast SrvReg Figure 2: Discovery: (1) Active (2) Passive Figure 4: Medium SLP System with s Multicast SrvRqst Multicast SrvRqst Multicast SrvRqst CU Scope NYU Scope Figure 3: Small SLP System without s update attribute values or add new attributes to a previously registered service. The new attributes replace the old values, but do not affect the attributes which were included previously and are not present in the update. Thus, a SrvReg message can be a fresh service registration or an update to a previous registration. An can also deregister the services with s using service deregistration (SrvDeReg) messages before the registered services become expired. Directory Agents (s) A serves as a centralized information repository in an SLP system. It accepts registrations and answers queries. support is optional in an SLP system; it is introduced for performance and scalability considerations. s can be discovered (Figure 2) in two ways: active or passive. In SLP, each periodically sends unsolicited advertisement (Advert) messages to the administratively scoped SLP multicast [10] address ( ). All s, s and s listen to this address to discover the existing s. This is known as passive discovery. s and s can also perform active discovery by issuing a multicast discovery service request message (SrvRqst with a service type of service:directoryagent ) to above address. s answer each discovery request with a unicast advertisement message. Whether s exist or not, an SLP system can provide the same service discovery functionality. However, it works a little bit differently. ffl In a small SLP system without s (Figure 3), s directly send service request (SrvRqst) messages to Figure 5: Large SLP System with Multiple Scoped s all s via multicast, and s respond with unicast service reply (SrvRply) messages. ffl Since it is not very efficient for a to query all s via multicast every time it does service discovery, in a medium-sized SLP system (Figure 4), s are introduced to provide a centralized directory service. s register services with s, and s look up service information from s. All service registrations from s and service queries from s are sent to s via unicast. ffl In a large SLP system (Figure 5), s are arranged into different scopes. For example, services from Columbia University and NYU are assigned to different scopes served by different s. This ensures further scalability of SLP. We can see that SLP achieves scalability by using s and service scopes. However, the centralized directory service provided by s presents a single failure point in an SLP system. To ensure reliability, multiple s are needed for each service scope. When multiple s are present, how should they interact with each other? This is an open issue in SLPv2 (SLP version 2). 3 DesignofmSLP mslp enhances SLP with an interaction scheme for s to provide a reliable directory service. It proposes that if s are needed in an SLP system, a fully meshed peering architecture should be used, i.e., more than one 3
4 1 Multicast Advert [ attr = mesh enhanced ] 2// Figure 6: Mesh-enhanced Advertisement should be present for each scope, and they maintain a fully meshed peer relationship. Peer s exchange their data for the shared scopes when they set up a peer relationship, and continue to exchange new service registration information during the entire peering period. As a result, peer s maintain the same consistent data for the shared scopes. Our design uses the following terminology: Peer s If two s have one or more scopes in common within one administrative domain, they are peers. Peer s coordinate with each other and store the same consistent data for the shared scopes. Peering TCP Connection - a persistent TCP connection kept by a pair of peer s for the entire peering period. It provides a reliable communication channel for the peer s to exchange messages. Therefore, a implementation is not burdened by managing message retransmissions. Its closing can be an indication of the termination of the peer relationship. Mesh-enhanced - a who maintains a fully meshed peering architecture with other s in an mslp system. It carries the mesh-enhanced attribute in its Advert messages (Figure 6) to distinguish itself from non-mesh-enhanced s. Mesh-aware - an who understands the meshenhanced attribute in a Advert message and uses the mesh-enhanced capability accordingly. In the next three subsections, we first describe our design considerations for mslp, then we discuss two important issues: how to manage the peer relationship and how to control message forwarding among peer s. 3.1 Design Considerations Reliability: The fully meshed peering architecture provides a reliable directory service for an SLP system. It achieves maximum robustness by ensuring that no single failure point exists in the system. All service registrations are kept by at least two s. If one is down, at least one other peer can continue to provide the service information for the scope. More importantly, the peering architecture enables a to recover from crash with much less effort since a rebooted can get the existing data from its peering set. The fully meshed peering architecture is built on top of a set of fully meshed peering TCP connections. We choose to use this set of fully meshed peering TCP connections mainly because it greatly facilitates message forwarding control. Any service registration information received by a only needs one-hop forwarding to reach all other s in the peering set. Since adding too many s to a peering set does not help a lot with the reliability, and it increases the maintenance overhead, we anticipate a small number of s for each service scope, and 2-4 is the recommended value. There is no need to have separate for each scope. A can serve multiple scopes, and a peering TCP connection is used for all shared scopes between each pair of peer s. Scalability: The SLPv2 specification requires that s register with all existing s and re-register when new s are discovered, or old s are found to have rebooted. This places a substantial burden on an implementation. With mslp, this requirement on s can be greatly simplified, i.e., a mesh-aware only needs to register with one mesh-enhanced in the registration scope, and the registration information will be propagated automatically within the meshed set. With mesh-enhanced s and simplified s, the overall system scalability can be enhanced. Compatibility: mslp is fully backward compatible with SLPv2. It does not introduce any new protocol elements. mslp only defines several new attributes for the Advert message and a new SLP extension ( meshforwarding extension ). As we have described in Section 2, each periodically multicasts unsolicited Advert messages, which enable a to be discovered by s, s and other s. A can put new attributes in its Advert messages to signify the information for coordination. Thus, by properly setting the attributes in Advert messages and properly handling these attributes at the other party, peer s can interact with each other to provide the desired functionality. The coordination is added as an enhancement to a, its original functions are not affected. Moreover, the changes are almost transparent to s and s. s can be kept unchanged. s can be greatly simplified if they use the mesh-forwarding capability for their service registrations. To do this, a mesh-aware needs to explicitly specify its mesh-forwarding request by using the mesh-forwarding extension (see Section 3.3 for detail). Deployment: mslp supports incremental deployment of mesh-enhanced s. A mesh-enhanced can set up peer relationships with both mesh-enhanced s and non-mesh-enhanced s. In the latter case, the message forwarding only goes in uni-direction from the meshenhanced to a non-mesh-enhanced. When meshenhanced s coexist with non-mesh-enhanced s in a system, a mesh-aware should take care of newly found non-mesh-enhanced s and rebooted non-meshenhanced s since these non-mesh-enhanced s can not get existing data from other s. Therefore, uniformly mesh-enhanced s can provide a much easier job for mesh-aware s. 4
5 1 Advert (TCP) [ attr = peering connection indication ] 2 1 Advert (TCP) [ attr = keepalive ] 2 1 Figure 7: Peering Connection Indication Advert (TCP) [ attr = data copy request ] SrvReg (TCP) (data of shared scopes) Figure 8: Dumping Data 3.2 Peer Relationship Management 2 A peer relationship has three stages: setting up, keeping, and tearing down. In mslp, a mesh-enhanced maintains a peer list. It adds an entry to the list whenever it discovers a new peer, and removes an entry when it finds the corresponding peer is down. Each entry in this peer list should include peer URL, shared scopes, boot timestamp, and peering TCP connection ID. The boot timestamp is used to identify a rebooted peer. The peering TCP connection is used for message forwarding. When a mesh-enhanced learns about a new peer, it creates a peering TCP connection to the peer (at port 427) if such connection does not yet exist. Then it sends a Advert message with the peering-connection-indication attribute through this channel to notify the peer that this is a peering TCP connection (Figure 7). Thus, the peer can also use this channel to send messages in opposite direction. After the peering TCP connection is established or identified, peer s begin to forward new service registration information to each other via this channel. At the same time, a mesh-enhanced should decide whether it needs to download the data from its new peers. For example, when a newly booted joins a peering set of three s, it needs to get a copy of the existing registration data from any one of these three s (the choice can be made randomly), but not from all of them which incurs a lot of redundant transmissions. To do this, it sends a Advert message with the data-copy-request attribute to the chosen peer (Figure 8). On the other end, when a meshenhanced receives the data-copy-request in a Advert message, it dumps all the data of the shared scopes to the requesting. Each data record is sent as a SrvReg message, with a re-calculated new lifetime (= old lifetime elapsed time). After exchanging the data in both directions, peer s have the same consistent data for the shared scopes. According to SLPv2, a could close a TCP connection if it has been idle for too long. To keep a peering TCP connection alive, a mesh-enhanced sends a Advert message with the keepalive attribute (Figure 9) to the Figure 9: Keepalive peer if no other messages have been sent via the channel for a long period (predefined). A mesh-enhanced should tear down a peer relationship when it finds that the peer has closed the peering TCP connection; when it receives a multicast Advert message from the peer with a stateless boot timestamp set to 0 meaning the peer is going to shutdown; or when it has not received any message from the peer via the peering channel for a long period (predefined). In the last case, there may be a network partition and peer states get inconsistent. To tear down a peer relationship, a stops forwarding any service registration information to this peer, closes peering TCP connection with this peer, and removes this peer from its peer list. 3.3 Message Forwarding Control During the peering period, peer s forward new service registration information from s to each other. We define a new SLP extension - mesh-forwarding extension for the message forwarding purpose. This extension is always six bytes long: five-byte extension header and one-byte extension data denoted as Action field. The Action field is used to specify forwarding actions: TO BE FORWARDED marks the message needs to be forwarded; HAS BEEN FORWARDED means the message has already been forwarded, and there is no need to be forwarded again. The message forwarding rules are as follows: 1. Explicit Forwarding: A message is forwarded only when it explicitely requests to be forwarded. A meshaware needs to attach the mesh-forwarding extension to a SrvReg or SrvDeReg message and set the Action field to TO BE FORWARDED if it wants the message to be forwarded by a mesh-enhanced. This is for the compatibility with SLPv2, where s need to register with all existing s. To avoid unnecessary forwarding, the explicit forwarding rule is used. 2. One-hop Forwarding: A SrvReg or SrvDeReg message is forwarded only once by a mesh-enhanced to all its peers in the registration scope. Before forwarding a message, a mesh-enhanced sets the Action field to HAS BEEN FORWARDED. In this way, a forwarded message will never be forwarded again. Since the peering set is in a fully connected mesh, one-hop forwarding is enough to ensure that the service registration information from an can reach all peer s. Figure 10 shows how a service registration message is forwarded. 3. Handling SrvAck: A always replies with a ser- 5
6 (TO_BE_FORWARDED) SrvReg / SrvDeReg SrvAck 1 (HAS_BEEN_FORWARDED) SrvReg / SrvDeReg SrvAck 2 1 (Busi., Engi.) Figure 10: Forwarding Registration Peering Connection / (Busi., Engi., Law) Peering Connection vice acknowledgment (SrvAck) message when it receives a SrvReg or SrvDeReg message. So a mesh-enhanced should process SrvAck messages from other s. 4 Example Let s go through an example to see how mslp works. Considering that we want to deploy an mslp system in Columbia University main campus, and we would like to assign the services in Law School (L-School), Business School (B-School) and Engineering School (E-School) to three different scopes. Instead of using a separate for each school, mslp uses three s in a fully meshed peering architecture. Each serves two scopes and each school is served by two s (Figure 11). For example, 1 serves both B-School and E-School, and L-School is served by 2 and 3. We can run this example on four computers: one for the /, and three for the s. Each machine can host only one since a needs to bind to the SLP reserved port 427. An mslp system can be in one of the three stages: 1. Normal stage: This is a stable stage featuring automatic registration information distribution. Assume that the mesh-aware does service registrations with the mesh-forwarding extension, say it registers services in B- School with 1, services in E-School with 2, and services in L-School with 3, then this mslp system will distributethe service registration information automatically among peer s for the shared scopes. Now let the query service information in L-School with 2, it will get the same data as what the has registered with Under partial crash: This is an unstable stage needs to be taken care of. Assume one of the three s crashes, say 1 (we can simulate its crash by removing its network connection and then turning it off), this mslp system can still function well unless more s crash. Although the data of B-School and E-School are not available from 1, they can be retrieved from 3 and 2, respectively. 3. Recovery from crash: When a crashed comes up, say 1 (we reconnect 1 machine to the network and reboot it), it sets up peer relationship with other s again. Since now 1 carries a new boot timestamp, 2 and 3 knows that it is rebooted and coordinates with it. 1 retrieves B-School data from 3 and E-School data from 2, then this peering set is back to normal. Thanks to the fully meshed peering architecture, the recovery of 1 from crash is done automatically through 2 (Engi., Law) Peering Connection Figure 11: an mslp System Example coordination, no involvement is needed. 5 Implementation 3 (Law, Busi.) We have done a prototype implementation of mslp. It is available at zwb/project/slp. A little more effort is needed for an mslp implementation which requires a peer relationship management and service registration forwarding control. However, an mslp implementation is greatly simplified since it no longer needs to implement the complicated algorithm to register with all existing s and to re-register when new s are discovered, or old s are found to have rebooted. So the overall implementation cost of mslp is about the same as SLPv2 if it is not reduced. 6 Related Work Our early work on mslp was presented as an Internet Draft in Interaction of SLP Directory Agents for Reliability and Scalability [14]. The fully meshed peer relationship is used in IBGP [13]. Redundancy is a basic method to ensure reliability, the DNS [11, 12] primary and secondary server architecture is a good example of this. 7 Conclusion In this paper we presented mslp - Mesh-enhanced Service Location Protocol. It enhances SLP with a fully meshed peering architecture. mslp can provide a reliable directory service for an SLP system. It can also greatly simplify service registration which can lead to a thin-client implementation. mslp is fully compatible with SLPv2, and it supports incremental deployment. A further extension to the interaction of mslp s is to forward queries besides registrations. It works as follows: When a mesh-enhanced receives a query which is not in its scope, it forwards the query to another which supports the scope. This can simplify implementation since s do not need to keep track of 6
7 scopes. A can send its queries to any mesh-enhanced. However, this adds much complexity to the meshenhanced implementation. First, a mesh-enhanced needs to keep track of all s of all scopes, not only the s that share some scopes with it. Second, a meshenhanced needs to forward the query to another, and it also needs to forward the reply from another back to the. mslp does not include this extension mainly due to its complexity. However, for a thin-client implementation, it might deserve further considerations. [13] Y. Rekhter and T. Li. A border gateway protocol 4 (BGP-4). Request for Comments 1771, Internet Engineering Task Force, March [14] W. Zhao and H. Schulzrinne. Interaction of SLP directory agents for reliability and scalability. Internet Draft, Internet Engineering Task Force, April Work in progress. Acknowledgments: Erik Guttman provided valuable comments and suggestions for our work on mslp. References [1] T. Berners-Lee, R. Fielding, and L. Masinter. Uniform resource identifiers (URI): generic syntax. Request for Comments 2396, Internet Engineering Task Force, August [2] Y. Goland, T. Cai, P. Leach, Y. Gu, and S. Albright. Simple service discovery Protocol/1.0 operationg without an arbiter. Internet Draft, Internet Engineering Task Force, November Work in progress. [3] E. Guttman, C. Perkins, and J. Kempf. Service templates and service: Schemes. Request for Comments 2609, Internet Engineering Task Force, June [4] E. Guttman, C. Perkins, J. Veizades, and M. Day. Service location protocol, version 2. Request for Comments 2608, Internet Engineering Task Force, June [5] Bluetooth home page. [6] Ir home page. [7] Jini home page. [8] Salutation home page. [9] UPnP home page. [10] D. Meyer. Administratively scoped IP multicast. Request for Comments 2365, Internet Engineering Task Force, July [11] P. V. Mockapetris. Domain names - concepts and facilities. Request for Comments 1034, Internet Engineering Task Force, November [12] P. V. Mockapetris. Domain names - implementation and specification. Request for Comments 1035, Internet Engineering Task Force, November
mslp - Mesh-enhanced Service Location Protocol Λ
mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao y, Henning Schulzrinne y and Erik Guttman z y Columbia University fzwb,hgsg@cs.columbia.edu z Sun Microsystems erik.guttman@germany.sun.com
More informationNetwork Working Group. E. Guttman Sun Microsystems April 2003
Network Working Group Request for Comments: 3528 Category: Experimental W. Zhao H. Schulzrinne Columbia University E. Guttman Sun Microsystems April 2003 Status of this Memo Mesh-enhanced Service Location
More informationSome Notes on Security in the Service Location Protocol Version 2 (SLPv2)
Some Notes on Security in the Service Location Protocol Version 2 (SLPv2) Marco Vettorello, Christian Bettstetter, and Christian Schwingenschlögl Technische Universität München (TUM), Institute of Communication
More informationA Service Browser for the Service Location Protocol Version 2 (SLPv2)
A Browser for the Location Protocol Version 2 (SLPv2) Eivind Jåsund, Christian Bettstetter, and Christian Schwingenschlögl Technische Universität München (TUM) Institute of Communication Networks D 80290
More informationJESA Service Discovery Protocol
JESA Service Discovery Protocol Efficient Service Discovery in Ad-Hoc Networks Stephan Preuß University of Rostock; Dept. of Computer Science; Chair for Information and Communication Services mailto:spr@informatik.uni-rostock.de
More informationService Recommendation using SLP
Service Recommendation using SLP Evan Hughes, David McCormack, Michel Barbeau, and Francis Bordeleau Carleton University, School of Computer Science 1125 Colonel By Drive Ottawa, ON Canada K1S 5B6 Email:
More informationService Location Protocol: A Java Prototype
Service Location Protocol: A Java Prototype Jack Caldwell Columbia University April 28, 1998 ABSTRACT The Internet continues to grow at exponential rates, offering a significant number of services to clients;
More informationService Location Protocol for Mobile Users
Location Protocol for Mobile Users Charles E. Perkins ABSTRACT Location Protocol has been designed within the Internet Engineering Task Force to simplify or eliminate the configuration needs for users
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationKeywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation.
SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Ritesh Mehta Department of Computer Science and Engineering The University of Texas at Arlington mehta@cse.uta.edu Abstract Advent of mobile and wireless computing
More informationSERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT
SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University
More informationCategory: Standards Track C. Perkins Sun Microsystems S. Kaplan June 1997
Network Working Group Request for Comments: 2165 Category: Standards Track J. Veizades @Home Network E. Guttman C. Perkins Sun Microsystems S. Kaplan June 1997 Service Location Protocol Status of This
More informationCharles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo
IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationNetwork Working Group. Sun Microsystems October 2001
Network Working Group Request for Comments: 3105 Category: Experimental J. Kempf NTT DoCoMo USA Labs G. Montenegro Sun Microsystems October 2001 Finding an RSIP Server with SLP Status of this Memo This
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationService Discovery and Invocation for Mobile Ad Hoc Networked Appliances
Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationComparative Study of Service Discovery Protocols for ad-hoc Networks
Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 156 Comparative Study of Service Discovery Protocols for
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationComparison of Bandwidth Usage: Service Location Protocol and Jini
Comparison of Bandwidth Usage: Service Location Protocol and Jini Javier Govea and Michel Barbeau School of Computer Science Carleton University 1125 Colonel By Drive Ottawa, ON K1S 5B6 Canada fjgovea,barbeaug@scs.carleton.ca
More informationDHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6.
DHCP for IPv6 Charles E. Perkins and Jim Bound Sun Microsystems, Inc. Palo Alto, CA 94303 Digital Equipment Company Nashua, NH 03062 Abstract The Dynamic Host Conguration Protocol (DHCPv6) provides a framework
More informationService Provision in Ad Hoc Networks
Service Provision in Ad Hoc Networks Radu Handorean and Gruia-Catalin Roman Department of Computer Science Washington University Saint Louis, MO, 63130 {raduh, roman}@cs.wustl.edu Abstract. The client-server
More informationSIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract
More informationUPnP Services and Jini Clients
UPnP Services and Jini Clients Jan Newmarch School of Network Computing Monash University jan.newmarch@infotech.monash.edu.au Abstract UPnP is middleware designed for network plug and play. It is designed
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationSERVICE DISCOVERY IN MOBILE ENVIRONMENTS
SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Nandini Ravi Department of Computer Science and Engineering University of Texas, Arlington nravi@cse.uta.edu Abstract Mobile computing and mobile devices such as
More informationChapter 3: Naming Page 38. Clients in most cases find the Jini lookup services in their scope by IP
Discovery Services - Jini Discovery services require more than search facilities: Discovery Clients in most cases find the Jini lookup services in their scope by IP multicast/broadcast Multicast UDP for
More informationDesign and Implementation of a Service Discovery Architecture in Pervasive Systems
Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it
More informationA DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET
2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More informationDHCP Technology White Paper
DHCP Technology White Paper Keywords: DHCP, DHCP server, DHCP relay agent, DHCP client, BOOTP client. Abstract: This document describes DHCP basic concepts and applications, as well as the main functions
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationA Service Discovery Model for Wireless and Mobile Terminals in IPv6
A Service Discovery Model for Wireless and Mobile Terminals in IPv6 Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harju Dept. of Information Technology, Tampere University of Technology, P.O. Box 553,
More informationJini Technology Overview
Jini Technology Overview Bob Scheifler Senior Staff Engineer Sun Microsystems, Inc Talk outline very brief Jini overview Jini lookup service in some depth service types and type matching attributes and
More informationFinding Support Information for Platforms and Cisco IOS Software Images
First Published: June 19, 2006 Last Updated: June 19, 2006 The Cisco Networking Services () feature is a collection of services that can provide remote event-driven configuring of Cisco IOS networking
More informationInternet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001
Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationCptS 464/564 Lecture 18
CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems
More informationChapter 13 Configuring BGP4
Chapter 13 Configuring BGP4 This chapter provides details on how to configure Border Gateway Protocol version 4 (BGP4) on HP products using the CLI and the Web management interface. BGP4 is supported on
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationEnhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks*
Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks* Deepesh Man Shrestha Graduate School of Information and Communication Ajou University, Suwon, Republic of Korea deepesh@ajou.ac.kr
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationCALIFORNIA SOFTWARE LABS
UPnP,Jini and Salutation - A look at some popular coordination frameworks for future networked CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway,
More informationCommon Service Discovery Scheme in IoT Environments
, pp.28-32 http://dx.doi.org/10.14257/astl.2018.149.07 Common Service Discovery Scheme in IoT Environments Joosang Youn 1 * and TaeJin Lee 2 1 Dept. of Industrial ICT Engineering, Dong-Eui University 176,
More informationOutline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model
CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility
More informationA SCALABLE SERVICE DISCOVERY FRAMEWORK WITH LOAD SHARING CAPABILITIES
A SCALABLE SERVICE DISCOVERY FRAMEWORK WITH LOAD SHARING CAPABILITIES Manuel Urueña, David Larrabeiti and Pablo Serrano Universidad Carlos III de Madrid Av. Universidad 30, Leganés. Spain {muruenya,dlarra,pablo}@it.uc3m.es
More informationOutline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.
CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility
More informationService Discovery in the Future Electronic Market
From: AAAI Technical Report WS-00-04. Compilation copyright 2000, AAAI (www.aaai.org). All rights reserved. Service Discovery in the Future Electronic Market Harry Chen, Dipanjan Chakraborty, Liang Xu,
More informationUsing MSDP to Interconnect Multiple PIM-SM Domains
Using MSDP to Interconnect Multiple PIM-SM Domains This module describes the tasks associated with using Multicast Source Discovery Protocol (MSDP) to interconnect multiple Protocol Independent Multicast
More informationRequest for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record
Network Working Group J. Peterson Request for Comments: 3764 NeuStar Category: Standards Track April 2004 enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Status of this
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More information[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions
[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open
More informationRendezvous Point Engineering
Rendezvous Point Engineering Last updated: November 2008 Introduction A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More informationMobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP
Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet
More informationDynamic Device Access for Mobile Users
Dynamic Device Access for Mobile Users Dirk Kutscher and Jörg Ott Technologiezentrum Informatik (TZI), Universität Bremen, Postfach 330440, 28334 Bremen, Germany, {dku jo}@tzi.uni-bremen.de Abstract. The
More informationContext-Aware Service Selection Based on Dynamic and Static Service Attributes
Context-Aware Service Selection Based on Dynamic and Static Service Attributes Steve Cuddy, Michael Katchabaw, and Hanan Lutfiyya Abstract -- Context-aware applications are able to use context, which refers
More informationObsoletes: 2002 January 2002 Category: Standards Track
Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document
More informationA Framework for Optimizing IP over Ethernet Naming System
www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul
More informationMobile, Distributed, and Pervasive Computing
Handbook of Wireless Networks and Mobile Computing, Edited by Ivan Stojmenović Copyright 2002 John Wiley & Sons, Inc. ISBNs: 0-471-41902-8 (Paper); 0-471-22456-1 (Electronic) CHAPTER 27 Mobile, Distributed,
More informationInternet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014
Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track ISSN: 2070-1721 D. Frost Blue Sun S. Bryant Cisco Systems M. Bocci Alcatel-Lucent June 2014 Abstract MPLS Transport
More informationNaming and Service Discovery in Peer-to-Peer Networks
Naming and Service Discovery in Peer-to-Peer Networks ECE1770 Expert Topic Eli Fidler Vinod Muthusamy February 13, 2003 Outline Traditional Distributed Naming Systems Distributed Naming Paradigms P2P Naming
More informationVoice over IP Consortium
Voice over IP Consortium Version 1.6 Last Updated: August 20, 2010 121 Technology Drive, Suite 2 University of New Hampshire Durham, NH 03824 Research Computing Center Phone: +1-603-862-0186 Fax: +1-603-862-4181
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationYet another redirection mechanism for the World-Wide Web?
Yet another redirection mechanism for the World-Wide Web? Aline Baggio Vrije Universiteit Department of Computer Science De Boelelaan 1081a 1081HV Amsterdam The Netherlands http://www.cs.vu.nl/ baggio/
More informationInternet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000
Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-15.txt J. Bound Compaq Computer Corp. M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center
More informationEnd-to-End Architectures for the Internet Host Mobility: An Overview
Page 1 of 7 End-to-End Architectures for the Internet Host Mobility: An Overview Bilal Farooq Lahore University of Management Sciences Department of Computer Science bilalf@lums.edu.pk April 7 th, 2003
More informationROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam
More informationService Discovery and Name Resolution Architectures for On-Demand MANETs
Service Discovery and Name Resolution Architectures for On-Demand MANETs Paal Engelstad, Yan Zheng, Tore Jønvik, Do Van Thanh University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad,
More informationInternet of Things 2018/2019
Internet of Things 2018/2019 Discovering the Things Johan Lukkien with slides by Milosh Stolikj John Carpenter, 1982 1 Guiding questions What does service discovery entail, and what are relevant criteria
More informationService Discovery in Pervasive Computing Environments
Service Discovery in Pervasive Computing Environments Presented by Jamal Lewis and Shruti Pathak CS 570 Computer Networks Instructor Dr. Feng Zhu Introduction What is it? Pervasive Computing Environments
More informationRedundancy for Routers using Enhanced VRRP
Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College
More informationStaged Refresh Timers for RSVP
Staged Refresh Timers for RSVP Ping Pan and Henning Schulzrinne Abstract The current resource Reservation Protocol (RSVP) design has no reliability mechanism for the delivery of control messages. Instead,
More informationRFC 003 Event Service October Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none.
Ubiquitous Computing Bhaskar Borthakur University of Illinois at Urbana-Champaign Software Research Group Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none The Event Service
More informationSERVICE DISCOVERY A SURVEY AND COMPARISON
SERVICE DISCOVERY A SURVEY AND COMPARISON Bendaoud Karim Talal 1 and Merzougui Rachid 2 1 STIC Laboratory, Department of Telecommunication, University of Tlemcen, Algeria bendaoud.talal@gmail.com 2 STIC
More informationA DHT-based Distributed Location Service for Internet Applications
A DHT-based Distributed Location Service for Internet Applications Simone Cirani and Luca Veltri Department of Information Engineering University of Parma Viale G. P. Usberti 181/A, 43100 Parma - Italy
More informationInternet Engineering Task Force (IETF) Request for Comments: ISSN: November 2013
Internet Engineering Task Force (IETF) N. Borenstein Request for Comments: 7072 Mimecast Category: Standards Track M. Kucherawy ISSN: 2070-1721 November 2013 Abstract A Reputation Query Protocol This document
More informationUtilizing Multiple Home Links in Mobile IPv6
Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp
More information[MS-WINSRA]: Windows Internet Naming Service (WINS) Replication and Autodiscovery Protocol
[MS-WINSRA]: Windows Internet Naming Service (WINS) Replication and Autodiscovery Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationName Resolution and Service Discovery on the Internet and in Ad Hoc Networks
Chapter 8 Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks Paal E. Engelstad and Geir Egeland CONTENTS Name Resolution... 172 An Architecture for Naming Services... 173 A Generic
More informationA Tutorial on The Jini Technology
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on The Jini Technology Lian Chen Introduction Jini network technology provides a simple
More informationIPV6 SIMPLE SECURITY CAPABILITIES.
IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationAgent-Enabling Transformation of E-Commerce Portals with Web Services
Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:
More informationDNS-based service discovery in ad hoc networks: evaluation and improvements
DNS-based service discovery in ad hoc networks: evaluation and improvements Celeste Campo and Carlos García-Rubio Dept. de Ingeniería Telemática - Universidad Carlos III de Madrid Escuela Politécnica Superior
More informationRequest for Comments: 5437 Category: Standards Track Isode Limited January 2009
Network Working Group Request for Comments: 5437 Category: Standards Track P. Saint-Andre Cisco A. Melnikov Isode Limited January 2009 Status of This Memo Sieve Notification Mechanism: Extensible Messaging
More informationAn agent-based peer-to-peer grid computing architecture
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 An agent-based peer-to-peer grid computing architecture J. Tang University
More informationA Location Service for Worldwide Distributed Objects
A Location Service for Worldwide Distributed Objects 1 A Location Service for Worldwide Distributed Objects Franz J. Hauck 1, Maarten van Steen, Andrew S. Tanenbaum Dept. of Math. and Computer Science,
More informationTransport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)
Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote
More informationInternet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001
Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-18.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco
More information